Computer networking: a top-down approach
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Pearson
[2017]
|
Ausgabe: | Seventh edition |
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029072419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Beschreibung: | Includes bibliographical references (pages 741-782) and index |
Umfang: | xxvi, 824 Seiten Illustrationen, Diagramme 24 cm |
ISBN: | 9780133594140 0133594149 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043659018 | ||
003 | DE-604 | ||
005 | 20160802 | ||
007 | t| | ||
008 | 160706s2017 xxua||| |||| 00||| eng d | ||
010 | |a 016004976 | ||
020 | |a 9780133594140 |9 978-0-13-359414-0 | ||
020 | |a 0133594149 |9 0-13-359414-9 | ||
035 | |a (OCoLC)953422120 | ||
035 | |a (DE-599)BVBBV043659018 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 | ||
050 | 0 | |a TK5105.875.I57 | |
082 | 0 | |a 004.6 |2 23 | |
084 | |a ST 200 |0 (DE-625)143611: |2 rvk | ||
100 | 1 | |a Kurose, James F. |d 1956- |e Verfasser |0 (DE-588)123704618 |4 aut | |
245 | 1 | 0 | |a Computer networking |b a top-down approach |c James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai |
250 | |a Seventh edition | ||
264 | 1 | |a Boston |b Pearson |c [2017] | |
264 | 4 | |c © 2017 | |
300 | |a xxvi, 824 Seiten |b Illustrationen, Diagramme |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 741-782) and index | ||
650 | 4 | |a Internet | |
650 | 4 | |a Computer networks | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Transportschicht |0 (DE-588)4301518-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Netzwerk |0 (DE-588)4171529-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Faseroptik |0 (DE-588)4016498-6 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
689 | 1 | 0 | |a Faseroptik |0 (DE-588)4016498-6 |D s |
689 | 1 | |8 3\p |5 DE-604 | |
689 | 2 | 0 | |a Netzwerk |0 (DE-588)4171529-9 |D s |
689 | 2 | |8 4\p |5 DE-604 | |
689 | 3 | 0 | |a Kommunikationsprotokoll |0 (DE-588)4128252-8 |D s |
689 | 3 | |8 5\p |5 DE-604 | |
689 | 4 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 4 | |8 6\p |5 DE-604 | |
689 | 5 | 0 | |a Transportschicht |0 (DE-588)4301518-9 |D s |
689 | 5 | |8 7\p |5 DE-604 | |
700 | 1 | |a Ross, Keith W. |d 1956- |e Verfasser |0 (DE-588)113704666 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029072419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 3\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 4\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 5\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 6\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 7\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-029072419 |
Datensatz im Suchindex
_version_ | 1819247279843835904 |
---|---|
adam_text | Computer
ano. i
lie
. - i • -
1.1 What Is the Internet?
1.1.1 A Nuts-and-Bolts Description
1.1.2 A Services Description
1.1.3 What Is a Protocol?
1.2 The Network Edge
1.2.1 Access Networks
1.2.2 Physical Media
1.3 The Network Core
1.3.1 Packet Switching
1.3.2 Circuit Switching
1.3.3 A Network of Networks
1.4 Delay, Loss, and Throughput in Packet-Switched Networks
1.4.1 Overview of Delay in Packet-Switched Networks
1.4.2 Queuing Delay and Packet Loss
1.4.3 End-to-End Delay
1.4.4 Throughput in Computer Networks
1.5 Protocol Layers and Their Service Models
1.5.1 Layered Architecture
1.5.2 Encapsulation
1.6 Networks Under Attack
1.7 History of Computer Networking and the Internet
1.7.1 The Development of Packet S witching: 1961-1972
1.7.2 Proprietary Networks and Internetworking: 1972-1980
1.7.3 A Proliferation of Networks: 1980-1990
1.7.4 The Internet Explosion: The 1990s
1.7.5 The New Millennium
1.8 Summary
Homework Problems and Questions
Wireshark Lab
interview: Leonard /.ieinrock
2
2
5
7
9
12
18
21
23
27
31
35
35
39
41
43
47
47
53
55
59
59
60
62
63
64
65
67
77
JUit.
XX TABLE OF CONTENTS
Chapter 2 Application Layer 83
2.1 Principles of Network Applications 84
2.1.1 Network Application Architectures 86
2.1.2 Processes Communicating 88
2.1.3 Transport Services Available to Applications 90
2.1.4 Transport Services Provided by the Internet 93
2.1.5 Application-Layer Protocols 96
2.1.6 Network Applications Covered in This Book 97
2.2 The Web and HTTP 98
2.2.1 Overview of HTTP 98
2.2.2 Non-Persistent and Persistent Connections 100
2.2.3 HTTP Message Format 103
2.2.4 User-Server Interaction: Cookies 108
2.2.5 Web Caching 110
2.3 Electronic Mail in the Internet 116
2.3.1 SMTP 118
2.3.2 Comparison with HTTP 121
2.3.3 Mail Message Formats 121
2.3.4 Mail Access Protocols 122
2.4 DNS—The Internet’s Directory Service 126
2.4.1 Services Provided by DNS 127
2.4.2 Overview of How DNS Works 129
2.4.3 DNS Records and Messages 135
2.5 Peer-to-Peer Applications 140
2.5.1 P2P File Distribution 140
2.6 Video Streaming and Content Distribution Networks 147
2.6.1 Internet Video 148
2.6.2 HTTP Streaming and DASH 148
2.6.3 Content Distribution Networks 149
2.6.4 Case Studies: Netflix, YouTube, and Kankan 153
2.7 Socket Programming: Creating Network Applications 157
2.7.1 Socket Programming with UDP 159
2.7.2 Socket Programming with TCP 164
2.8 Summary 170
Homework Problems and Questions 171
Socket Programming Assignments 180
Wireshark Labs: HTTP, DNS 182
Interview: Marc Andreessen 184
xxi
187
188
188
191
193
200
204
204
206
208
217
221
226
233
233
236
241
244
252
255
261
261
268
269
279
282
284
286
301
302
303
- ^ : J
306
306
311
313
316
319
321
TABLE OF CONTENTS
Transport Layer
3.1 Introduction and Transport-Layer Services
3.1.1 Relationship Between Transport and Network Layers
3.1.2 Overview of the Transport Layer in the Internet
3.2 Multiplexing and Demultiplexing
3.3 Connectionless Transport: UDP
3.3.1 UDP Segment Structure
3.3.2 UDP Checksum
3.4 Principles of Reliable Data Transfer
3.4.1 Building a Reliable Data Transfer Protocol
3.4.2 Pipelined Reliable Data Transfer Protocols
3.4.3 Go-Back-N (GBN)
3.4.4 Selective Repeat (SR)
3.5 Connection-Oriented Transport: TCP
3.5.1 The TCP Connection
3.5.2 TCP Segment Structure
3.5.3 Round-Trip Time Estimation and Timeout
3.5.4 Reliable Data Transfer
3.5.5 Flow Control
3.5.6 TCP Connection Management
3.6 Principles of Congestion Control
3.6.1 The Causes and the Costs of Congestion
3.6.2 Approaches to Congestion Control
3.7 TCP Congestion Control
3.7.1 Fairness
3.7.2 Explicit Congestion Notification (ECN): Network-assisted
Congestion Control
3.8 Summary
Homework Problems and Questions
Programming Assignments
Wireshark Labs: Exploring TCP, UDP
Interview: Van Jacobson
4.1 Overview of Network Layer
4.1.1 Forwarding and Routing: The Network Data and Control Planes
4.1.2 Network Service Models
4.2 What’s Inside a Router?
4.2.1 Input Port Processing and Destination-Based Forwarding
4.2.2 Switching
4.2.3 Output Port Processing
TABLE OF CONTENTS
xxii
4.2.4 Where Does Queuing Occur? 321
4.2.5 Packet Scheduling 325
4.3 The Internet Protocol (IP): IPv4, Addressing, IPv6, and More 329
4.3.1 IPv4 Datagram Format 330
4.3.2 IPv4 Datagram Fragmentation 332
4.3.3 IPv4 Addressing 334
4.3.4 Network Address Translation (NAT) 345
4.3.5 IPv6 348
4.4 Generalized Forwarding and SDN 354
4.4.1 Match 356
4.4.2 Action 358
4.4.3 OpenFlow Examples of Match-plus-action in Action 358
4.5 Summary 361
Homework Problems and Questions 361
Wireshark Lab 370
Interview: Vinton G. Cerf 371
Chapters The Network Layers Control Plane 373
5.1 Introduction 374
5.2 Routing Algorithms 376
5.2.1 The Link-State (LS) Routing Algorithm 379
5.2.2 The Distance-Vector (DV) Routing Algorithm 384
5.3 Intra-AS Routing in the Internet: OSPF 391
5.4 Routing Among the ISPs: BGP 395
5.4.1 The Role of BGP 395
5.4.2 Advertising BGP Route Information 396
5.4.3 Determining the Best Routes 398
5.4.4 IP-Anycast 402
5.4.5 Routing Policy 403
5.4.6 Putting the Pieces Together: Obtaining Internet Presence 406
5.5 The SDN Control Plane 407
5.5.1 The SDN Control Plane: SDN Controller and SDN Control
Applications 410
5.5.2 OpenFlow Protocol 412
5.5.3 Data and Control Plane Interaction: An Example 414
5.5.4 SDN: Past and Future 415
5.6 ICMP: The Internet Control Message Protocol 419
5.7 Network Management and SNMP 421
5.7.1 The Network Management Framework 422
5.7.2 The Simple Network Management Protocol (SNMP) 424
5,8 Summary 426
TABLE OF CONTENTS xxiii
Homework Problems and Questions 427
Socket Programming Assignment 433
Programming Assignment 434
Wireshark Lab 435
interview: Jennifer Rexford 436
Chapter 6 The Link Layer and LANs 439
6.1 Introduction to the Link Layer 440
6.1.1 The Services Provided by the Link Layer 442
6.1.2 Where Is the Link Layer Implemented? 443
6.2 Error-Detection and -Correction Techniques 444
6.2.1 Parity Checks 446
6.2.2 Checksumming Methods 448
6.2.3 Cyclic Redundancy Check (CRC) 449
6.3 Multiple Access Links and Protocols 451
6.3.1 Channel Partitioning Protocols 453
6.3.2 Random Access Protocols 455
6.3.3 Taking-Turns Protocols 464
6.3.4 DOCSIS: The Link-Layer Protocol for Cable Internet Access 465
6.4 Switched Local Area Networks 467
6.4.1 Link-Layer Addressing and ARP 468
6.4.2 Ethernet 474
6.4.3 Link-Layer Switches 481
6.4.4 Virtual Local Area Networks (VLANs) 487
6.5 Link Virtualization: A Network as a Link Layer 491
6.5.1 Multiprotocol Label Switching (MPLS) 492
6.6 Data Center Networking 495
6.7 Retrospective: A Day in the Life of a Web Page Request 500
6.7.1 Getting Started: DHCP, UDP, IP, and Ethernet 500
6.7.2 Still Getting Started: DNS and ARP 502
6.7.3 Still Getting Started: Intra-Domain Routing to the DNS Server 503
6.7.4 Web Client-Server Interaction: TCP and HTTP 504
6.8 Summary 506
Homework Problems and Questions 507
Wireshark Lab 515
Interview: Cimon C. Lam . ¡j f;
.... ::. Lv7 /La.32:: a:a. /a.i.It :?/:.:.:.:.
7.1 Introduction 520
7.2 Wireless Links and Network Characteristics 525
7.2.1 CDMA 528
XXIV
TABLE OF CONTENTS
Chapter 8
7.3 WiFi: 802.11 Wireless LANs 532
7.3.1 The 802.11 Architecture 533
7.3.2 The 802.11 MAC Protocol 537
7.3.3 The IEEE 802.11 Frame 542
7.3.4 Mobility in the Same IP Subnet 546
7.3.5 Advanced Features in 802.11 547
7.3.6 Personal Area Networks: Bluetooth and Zigbee 548
7.4 Cellular Internet Access 551
7.4.1 An Overview of Cellular Network Architecture 551
7.4.2 3G Cellular Data Networks: Extending the Internet
to Cellular Subscribers 554
7.4.3 On to 4G: LTE 557
7.5 Mobility Management: Principles 560
7.5.1 Addressing 562
7.5.2 Routing to a Mobile Node 564
7.6 Mobile IP 570
7.7 Managing Mobility in Cellular Networks 574
7.7.1 Routing Calls to a Mobile User 576
7.7.2 Handoffs in GSM 577
7.8 Wireless and Mobility: Impact on Higher-Layer Protocols 580
7.9 Summary 582
Homework Problems and Questions 583
Wireshark Lab 588
Interview: Deborah Estrin 589
Security in Computer Networks 593
8.1 What Is Network Security? 594
8.2 Principles of Cryptography 596
8.2.1 Symmetric Key Cryptography 598
8.2.2 Public Key Encryption 604
8.3 Message Integrity and Digital Signatures 610
8.3.1 Cryptographic Hash Functions 611
8.3.2 Message Authentication Code 613
8.3.3 Digital Signatures 614
8.4 End-Point Authentication 621
8.4.1 Authentication Protocol apl.O 622
8.4.2 Authentication Protocol ap2.0 622
8.4.3 Authentication Protocol ap3.0 623
8.4.4 Authentication Protocol ap3.1 623
8.4.5 Authentication Protocol ap4.0 624
XXV
626
627
630
631
632
635
637
638
640
640
641
645
646
646
648
651
651
659
662
664
672
672
673
675
676
676
677
679
681
683
684
688
688
691
694
697
700
700
703
TABLE OF CONTENTS
8.5 Securing E-Mail
8.5.1 Secure E-Mail
8.5.2 PGP
8.6 Securing TCP Connections: SSL
8.6.1 The Big Picture
8.6.2 A More Complete Picture
8.7 Network-Layer Security: IPsec and Virtual Private Networks
8.7.1 IPsec and Virtual Private Networks (VPNs)
8.7.2 The AH and ESP Protocols
8.7.3 Security Associations
8.7.4 The IPsec Datagram
8.7.5 IKE: Key Management in IPsec
8.8 Securing Wireless LANs
8.8.1 Wired Equivalent Privacy (WEP)
8.8.2 IEEE 802. Hi
8.9 Operational Security: Firewalls and Intrusion Detection Systems
8.9.1 Firewalls
8.9.2 Intrusion Detection Systems
8.10 Summary
Homework Problems and Questions
Wireshark Lab
IPsec Lab
Interview: Steven M. Bellovin
Multimedia Networking
9.1 Multimedia Networking Applications
9.1.1 Properties of Video
9.1.2 Properties of Audio
9.1.3 Types of Multimedia Network Applications
9.2 Streaming Stored Video
9.2.1 UDP Streaming
9.2.2 HTTP Streaming
9.3 Voice-over-IP
9.3.1 Limitations of the Best-Effort IP Service
9.3.2 Removing Jitter at the Receiver for Audio
9.3.3 Recovering from Packet Loss
9.3.4 Case Study: VoIP with Skype
9.4 Protocols for Real-Time Conversational Applications
9.4.1 RTP
9.4.2 SIP
xxvi
TABLE OF CONTENTS
9.5 Network Support for Multimedia 709
9.5.1 Dimensioning Best-Effort Networks 711
9.5.2 Providing Multiple Classes of Service 712
9.5.3 Diffserv 719
9.5.4 Per-Connection Quality-of-Service (QoS) Guarantees:
Resource Reservation and Call Admission 723
9.6 Summary 726
Homework Problems and Questions 727
Programming Assignment 735
Interview: Henning Schulzrinne 736
References 741
Index 783
|
any_adam_object | 1 |
author | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_GND | (DE-588)123704618 (DE-588)113704666 |
author_facet | Kurose, James F. 1956- Ross, Keith W. 1956- |
author_role | aut aut |
author_sort | Kurose, James F. 1956- |
author_variant | j f k jf jfk k w r kw kwr |
building | Verbundindex |
bvnumber | BV043659018 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 |
callnumber-search | TK5105.875.I57 |
callnumber-sort | TK 45105.875 I57 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 200 |
ctrlnum | (OCoLC)953422120 (DE-599)BVBBV043659018 |
dewey-full | 004.6 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.6 |
dewey-search | 004.6 |
dewey-sort | 14.6 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Seventh edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03209nam a2200745 c 4500</leader><controlfield tag="001">BV043659018</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160802 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">160706s2017 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016004976</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780133594140</subfield><subfield code="9">978-0-13-359414-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0133594149</subfield><subfield code="9">0-13-359414-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)953422120</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043659018</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.875.I57</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.6</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 200</subfield><subfield code="0">(DE-625)143611:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kurose, James F.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123704618</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer networking</subfield><subfield code="b">a top-down approach</subfield><subfield code="c">James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Seventh edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Pearson</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxvi, 824 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 741-782) and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Faseroptik</subfield><subfield code="0">(DE-588)4016498-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Netzwerk</subfield><subfield code="0">(DE-588)4171529-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="8">4\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Kommunikationsprotokoll</subfield><subfield code="0">(DE-588)4128252-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">5\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="8">6\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="5" ind2="0"><subfield code="a">Transportschicht</subfield><subfield code="0">(DE-588)4301518-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="5" ind2=" "><subfield code="8">7\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ross, Keith W.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)113704666</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029072419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">3\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">4\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">5\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">6\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">7\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029072419</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV043659018 |
illustrated | Illustrated |
indexdate | 2024-12-20T17:41:49Z |
institution | BVB |
isbn | 9780133594140 0133594149 |
language | English |
lccn | 016004976 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029072419 |
oclc_num | 953422120 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xxvi, 824 Seiten Illustrationen, Diagramme 24 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Pearson |
record_format | marc |
spellingShingle | Kurose, James F. 1956- Ross, Keith W. 1956- Computer networking a top-down approach Internet Computer networks Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Computer (DE-588)4070083-5 gnd Netzwerk (DE-588)4171529-9 gnd Faseroptik (DE-588)4016498-6 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4308416-3 (DE-588)4301518-9 (DE-588)4128252-8 (DE-588)4070083-5 (DE-588)4171529-9 (DE-588)4016498-6 (DE-588)4123623-3 |
title | Computer networking a top-down approach |
title_auth | Computer networking a top-down approach |
title_exact_search | Computer networking a top-down approach |
title_full | Computer networking a top-down approach James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai |
title_fullStr | Computer networking a top-down approach James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai |
title_full_unstemmed | Computer networking a top-down approach James F. Kurose, University of Massachusetts, Amherst, Keith W. Ross, NYU and NYU Shanghai |
title_short | Computer networking |
title_sort | computer networking a top down approach |
title_sub | a top-down approach |
topic | Internet Computer networks Rechnernetz (DE-588)4070085-9 gnd Internet (DE-588)4308416-3 gnd Transportschicht (DE-588)4301518-9 gnd Kommunikationsprotokoll (DE-588)4128252-8 gnd Computer (DE-588)4070083-5 gnd Netzwerk (DE-588)4171529-9 gnd Faseroptik (DE-588)4016498-6 gnd |
topic_facet | Internet Computer networks Rechnernetz Transportschicht Kommunikationsprotokoll Computer Netzwerk Faseroptik Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029072419&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT kurosejamesf computernetworkingatopdownapproach AT rosskeithw computernetworkingatopdownapproach |